{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:45Z","timestamp":1725797145162},"publisher-location":"Boston, MA","reference-count":20,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475780161"},{"type":"electronic","value":"9781402081439"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8143-x_35","type":"book-chapter","created":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T11:39:43Z","timestamp":1135337983000},"page":"533-548","source":"Crossref","is-referenced-by-count":5,"title":["Key Management for Secure Multicast in Hybrid Satellite Networks"],"prefix":"10.1007","author":[{"given":"Ayan","family":"Roy-Chowdhury","sequence":"first","affiliation":[]},{"given":"John S.","family":"Baras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"35_CR1","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/49.564141","volume":"15","author":"G Armitage","year":"1997","unstructured":"Armitage, G. (1997). \u201cIP Multicasting over ATM Networks\u201d. IEEE Journal on Selected Areas in Communications, 15(3):445\u2013157.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"35_CR2","first-page":"535","volume":"547","author":"S Berkovits","year":"1991","unstructured":"Berkovits, S. (1991). \u201cHow To Broadcast A Secret\u201d. Advances in Cryptology \u2014 EUROCRYPT \u201991, Lecture Notes in Computer Science, LNCS, 547:535\u2013541.","journal-title":"LNCS"},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201994","author":"M Burmester","year":"1994","unstructured":"Burmester, M. and Desmedt, Y. (1994). \u201cA Secure and Efficient Conference Key Distribution System\u201d. Advances in Cryptology \u2014 EUROCRYPT \u201994, Lecture Notes in Computer Science."},{"key":"35_CR4","volume-title":"Multicast Security: A Taxonomy and Some Efficient Constructions","author":"R Canetti","year":"1999","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., and Pinkas, B. (1999). \u201cMulticast Security: A Taxonomy and Some Efficient Constructions\u201d. Proceedings oflNFOCOMM \u201999."},{"key":"35_CR5","first-page":"8","volume":"15","author":"G Chiou","year":"1989","unstructured":"Chiou, G. and Chen, W. (1989). \u201cSecure Broadcasting Using the Secure Lock\u201d. IEEE Transac tions on Software Engineering, 15(8).","journal-title":"IEEE Transac tions on Software Engineering"},{"issue":"2","key":"35_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/90.490743","volume":"4","author":"SE Deering","year":"1996","unstructured":"Deering, S.E., Estrin, D., Farinacci, D., Jacobson, V., Liu, C-G, and Wei, L. (1996). \u201cThe PIM Architecture for Wide-Area Multicast Routing\u201d. IEEE\/ACM Transactions on Networking, 4(2):153\u2013162.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume":"773","author":"A Fiat","year":"1994","unstructured":"Fiat, A. and Naor, M. (1994). \u201cBroadcast Encryption\u201d. Advances in Cryptology \u2014 CRYPTO \u201993, Lecture Notes in Computer Science, LNCS, 773:480\u2013491.","journal-title":"Lecture Notes in Computer Science, LNCS"},{"key":"35_CR8","volume-title":"Group Key Management Protocol (GKMP) Architec ture","author":"H Harney","year":"1997","unstructured":"Harney, H. and Muckenhirn, C. (1997). \u201cGroup Key Management Protocol (GKMP) Architec ture\u201d. Internet RFC 2094."},{"key":"35_CR9","first-page":"180","volume-title":"Proc. ofJCCl\u201996, The 6th Joint Conference on Communication and Information","author":"KS Kim","year":"1996","unstructured":"Kim, K. S., Kim, S. J., and Won, D. H. (1996). \u201cConditional Access System Using Smart Card\u201d. Proc. ofJCCl\u201996, The 6th Joint Conference on Communication and Information, pages 180\u2013183."},{"key":"35_CR10","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume":"293","author":"T Matsumoto","year":"1988","unstructured":"Matsumoto, T. and Imai, H. (1988). \u201cOn the KEY PREDISTRIBUTION SYSTEM: A Partical Solution to the Key Distribution Problem\u201d. Advances in Cryptology \u2014 CRYPTO \u201987, Lecture Notes in Computer Science, LNCS, 293:185\u2013193.","journal-title":"Advances in Cryptology \u2014 CRYPTO \u201987, Lecture Notes in Computer Science, LNCS"},{"key":"35_CR11","first-page":"277","volume-title":"Proceedings of ACMSIGCOMM\u201997","author":"S Mittra","year":"1997","unstructured":"Mittra, S. (1997). \u201cIolus: A Framework for Scalable Secure Multicasting\u201d. In Proceedings of ACMSIGCOMM\u201997, pages 277\u2013288."},{"key":"35_CR12","volume-title":"Opnet Modeler 9.0","author":"Opnet","year":"2002","unstructured":"Opnet (2002). Opnet Modeler 9.0. \n http:\/\/www.opnet.com\n \n \/products\/modeler\/home.html."},{"key":"35_CR13","volume-title":"ELK, a New Protocol for Efficient Large-Group Key Distribution","author":"A Perrig","year":"2001","unstructured":"Perrig, A., Song, D., and Tygar, J.D. (2001). \u201cELK, a New Protocol for Efficient Large-Group Key Distribution\u201d. Proceedings of IEEE Security and Privacy Symposium S& P2001."},{"key":"35_CR14","volume-title":"PhD thesis, University of Maryland College Park","author":"R Poovendran","year":"1999","unstructured":"Poovendran, R. (1999). \u201cKey Management for Secure Multicast Communication\u201d. PhD thesis, University of Maryland College Park."},{"key":"35_CR15","volume-title":"Optimized Group Rekey for Group Commu nication Systems","author":"O Rodeh","year":"2000","unstructured":"Rodeh, O., Birman, K., and Dolev, D. (2000). \u201cOptimized Group Rekey for Group Commu nication Systems\u201d. Proceedings of Network and Distributed System Security Symposium (NDSS\u201900)."},{"key":"35_CR16","volume-title":"Master\u2019s thesis, Univeristy of Maryland College Park","author":"A Roy-Chowdhury","year":"2003","unstructured":"Roy-Chowdhury, A. (2003). \u201cIP Routing and Key Management for Secure Multicast in Satellite ATM Networks\u201d. Master\u2019s thesis, Univeristy of Maryland College Park."},{"key":"35_CR17","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/0-387-34799-2_37","volume":"403","author":"D Steer","year":"1990","unstructured":"Steer, D., Strawczynski, L., Diffie, W, and Wiener, M. (1990). \u201cA Secure Audio Teleconference System\u201d. Advances in Cryptology \u2014 CRYPTO \u201988, Lecture Notes in Computer Science, LNCS, 403:520\u2013528.","journal-title":"Advances in Cryptology \u2014 CRYPTO \u201988, Lecture Notes in Computer Science, LNCS"},{"issue":"8","key":"35_CR18","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., and Waidner, M. (2000). \u201cKey Agreement in Dynamic Peer Groups\u201d. IEEE Transactions on Parallel and Distributed Systems, 11(8):769\u2013780.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"35_CR19","volume-title":"Key Management for Multicast: Issues and Ar chitectures","author":"D Wallner","year":"1999","unstructured":"Wallner, D., Harder, E., and Ag\u00e9e, R. (1999). \u201cKey Management for Multicast: Issues and Ar chitectures\u201d. Internet RFC 2627."},{"issue":"1","key":"35_CR20","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"CK Wong","year":"2000","unstructured":"Wong, C. K., Gouda, M., and Lam, S. S. (2000). \u201cSecure Group Communications Using Key Graphs\u201d. IEEE\/ACM Transactions on Networking, 8(1): 16\u201330.","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Security and Protection in Information Processing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8143-X_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T22:24:21Z","timestamp":1549491861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8143-X_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781475780161","9781402081439"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8143-x_35","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}